mHow

1.5K posts

mHow banner
mHow

mHow

@mh0ward

Security Consultant

Katılım Eylül 2013
372 Takip Edilen237 Takipçiler
mHow
mHow@mh0ward·
@dyn___ @XorNinja Is your friend Jon Erickson? 😅 I think the first time I learned of format string specifier vulnerabilities was from his book quite a while ago 😁
English
0
0
0
8
thaidn
thaidn@XorNinja·
We asked Claude to find a bug in Vim. It found an RCE. Just open a file, and you’re owned. We joked: fine, we’ll switch to Emacs. Then Claude found an RCE there too. Full story: blog.calif.io/p/mad-bugs-vim…
English
25
204
1.3K
214.8K
mHow retweetledi
IT Guy
IT Guy@T3chFalcon·
Huge Anthropic leak just dropped: the entire Claude Code CLI source is now public. A misconfigured .map file in their npm package exposed a direct download link to the full unobfuscated TypeScript codebase from Anthropic’s own R2 bucket. Discovered by Chaofan Shou (@Fried_rice), the dump is massive 1,900 files, 512,000+ lines including the complete tool system, 50+ slash commands, multi-agent coordinator, React/Ink terminal UI, IDE bridge, permission engine, and several unreleased features. Full repo is live on GitHub(@nichxbt ): github.com/nirholas/claud… Clean mirrors are already up for easy browsing(@baanditeagle): cc-poster.vercel.app cc-hidden-deploy.vercel.app It’s spreading fast, the entire dev community is already tearing through it.
Chaofan Shou@Fried_rice

Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip

English
320
1.3K
10.1K
1.6M
mHow retweetledi
Kinnaird McQuade 💻☁️💥
We found a critical vulnerability in @OpenAI Codex affecting all Codex users, allowing exfil of a victim’s GitHub tokens to our C2 server. This granted lateral movement and R/W access to a victim’s entire code base 😈 This was a crazy one by @crew7sec at @btphantomlabs
BeyondTrust Phantom Labs™@btphantomlabs

Breaking: Newly uncovered OpenAI Codex vuln enables command injection via GitHub branch names in task creation requests. Attackers could steal GitHub user access tokens & sensitive data. Full breakdown by Tyler Jespersen: lnkd.in/ewdTaiEa #OpenAI #BTPhantomLabs

English
25
131
814
205.1K
mHow
mHow@mh0ward·
@Motor1com Any idea if the new Tremec 6spd manual will be a factory option yet?
English
2
1
0
398
mHow retweetledi
Haakon Wibe
Haakon Wibe@HaakonWibe·
Look.. it's a Conditional Access policy simulator built by an infra architect guy who got tired of squinting at What If results 🫠 Shiny graphs yay! 🔗ca.haakonwibe.com No sign-in needed, click Sample Data and play around. Or connect to your own data - all's in browser.
GIF
English
15
105
591
58.7K
mHow retweetledi
Cointelegraph
Cointelegraph@Cointelegraph·
🚨 ALERT: Around 149M user credentials were exposed in a massive infostealer data dump, including roughly 420k Binance-related logins. The leak originated from malware-infected devices, not a Binance breach.
Cointelegraph tweet media
English
116
243
1.2K
297.3K
mHow
mHow@mh0ward·
@thedawgyg If you’re completely new to exploit dev, this is probably worth taking a look at: corelan.be/index.php/arti… It’s fairly old at this point and for 32-bit, but still good for learning concepts and bypass techniques. For example, chaining ROP gadgets is still relevant.
English
1
0
2
79
dawgyg - WoH
dawgyg - WoH@thedawgyg·
So maybe this will work lol... I am looking to find some people (or person) that know about exploit dev. I can find the crashes/vulns but I dont know how to take the info and then create an exploit (POC exploits, not looking to make malicious exploits). Anyone out there that has the experience in taking library/software bugs/vulns and turning them into the chains needed willing to work with me to help me learn? Would be down to work out agreements to make sure its worth the time and effort of course for all involved, as i know this is likely something that will take alot of effort. #bugbounty #exploit #exploitdev #0day
English
6
5
50
5.4K
mHow retweetledi
SpecterOps
SpecterOps@SpecterOps·
WSL2 is a powerful attacker hideout because it runs as a separate Hyper-V VM, and defenders rarely monitor it. Daniel Mayer explains how attackers pivot into WSL2 and what it took to build tooling that works across WSL2 versions. Read more ⤵️ ghst.ly/45fPUma
English
8
172
727
103.2K
mHow retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices. projectzero.google/2026/01/pixel-…
English
7
238
1K
115.5K
mHow retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Dumping juicy secrets from SAM/LSA is always nice right? I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀 No need for manual registry hive extraction anymore!
Alex Neff tweet media
English
9
65
316
12.8K
mHow retweetledi
André Baptista
André Baptista@0xacb·
When testing GraphQL APIs make sure to run graphw00f (github.com/dolevf/graphw0…) to fingerprint the specific GraphQL implementation the application is running. Then you can review the Threat Matrix to get likely attack vectors.
English
2
82
426
38.4K